<--- Back to Details
First PageDocument Content
Export Administration Act / Computer law / International trade / Business / Military science / Export / Strong cryptography / United States Munitions List / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce
Export Administration Act
Computer law
International trade
Business
Military science
Export
Strong cryptography
United States Munitions List
Export of cryptography in the United States
Identifiers
Military technology
United States Department of Commerce

Add to Reading List

Source URL: frwebgate.access.gpo.gov

Download Document from Source Website

Share Document on Facebook

Similar Documents

Computer access control / Cryptography / Computer security / Prevention / Multi-factor authentication / Authentication / Financial technology / Password

CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

DocID: 1qXun - View Document

Cryptography / Integer sequences / Integer factorization algorithms / Primality tests / Safe prime / Finite fields / RSA / Prime number / Strong prime / Blum integer / Trial division / Quadratic sieve

The Million-Key Question—Investigating the Origins of RSA Public Keys Petr Švenda, Matúš Nemec, Peter Sekan, Rudolf Kvašňovský, David Formánek, David Komárek, and Vashek Matyáš, Masaryk University https://www

DocID: 1q9Fs - View Document

Computer access control / Cryptography / Computer security / Credit cards / Strong authentication / 3-D Secure / Security / Authentication / Card scheme

  14 th November 2014 European Banking Authority Tower 42 (levelOld Broad Street London EC2N 1HQ

DocID: 1pYp4 - View Document

Software / Cryptography / Computing / Character encoding / Unicode Transformation Formats / Encodings / Cryptographic software / Password / Passphrase / Random password generator / UTF-16 / Byte order mark

PWGen for Windows - Generator of cryptographically strong passwords USER MANUAL VersionLicensing Information

DocID: 1pS4j - View Document

Computer access control / Computing / Cryptography / Computer security / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / Dropbox / CCID / LastPass

YubiKey 4 and YubiKey 4 Nano • YubiKey 4 and YubiKey 4 Nano offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV, OpenPGP, OATH-TOTP, and OATH-HOTP) --

DocID: 1oc5c - View Document